Saturday, February 15, 2025
Tag:

Vulnerabilities

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant vulnerabilities in its VPN...

Critical ChatGPT Plugins Flaw Let Attackers Gain Control Over Organization’s Account

Threat actors can exploit ChatGPT's ecosystem for several illicit purposes, such as crafting prompts to generate malicious code, phishing lures, and disinformation content.Even threat...

Multiple Flaws in ArubaOS Switches Let Attackers Execute Remote Code

Multiple vulnerabilities have been identified in ArubaOS-Switch Switches, specifically pertaining to Stored Cross-site Scripting (Stored XSS), Denial of Service (DoS), and Memory corruption.Aruba...

HPE Aruba Networking Product Vulnerabilities Allow File Overwrite

The vulnerabilities, CVE-2023-38401 and CVE-2023-38402, affect the HPE Aruba Networking Virtual Intranet Access (VIA) client for the Microsoft Windows operating system. If the exploit...

CISA Advisory of Top 42 Frequently Exploited Flaws of 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from...

RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:exploits – modules that...

Spotify Hack – Over 300k Accounts Hacked in Credential Stuffing Attack

Spotify is a Swedish-based audio streaming and media services provider, with over 299 million active monthly users in 2020.Noam Rotem and Ran Locar, vpnMentor’s research team...

OkCupid Vulnerabilities Let Hackers to Steal the Personal and Sensitive Data of Users

OkCupid is one of the most popular dating apps that has more than 50 million registered users and used in 110 countries. The app...